2014
DOI: 10.3390/jsan3030181
|View full text |Cite
|
Sign up to set email alerts
|

An Authenticated Key Agreement Scheme for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 1 publication
0
14
0
Order By: Relevance
“…For the purposes that they think different cases will have different purposes, and the trust should be evaluated bases on these different purposes. For example the paper [5] is using direct trust, recommendation, incentive function, and active degree on the nodes to measure the trust; and the paper [6] uses communication trust, data trust, and energy trust that in communication trust it has direct trust and indirect trust; and the papers [7][8][9][10] all have different purposes and metrics, but they both use the direct trust and indirect trust metrics. There are two popular ways to combine the metrics in current trust algorithms which weight factors in [10] and fuzzy logic in [17].…”
Section: B Modelling Trust In Computer Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…For the purposes that they think different cases will have different purposes, and the trust should be evaluated bases on these different purposes. For example the paper [5] is using direct trust, recommendation, incentive function, and active degree on the nodes to measure the trust; and the paper [6] uses communication trust, data trust, and energy trust that in communication trust it has direct trust and indirect trust; and the papers [7][8][9][10] all have different purposes and metrics, but they both use the direct trust and indirect trust metrics. There are two popular ways to combine the metrics in current trust algorithms which weight factors in [10] and fuzzy logic in [17].…”
Section: B Modelling Trust In Computer Networkmentioning
confidence: 99%
“…The equation for effective size described in [23] as below: , where i E is the effective size for node i. Equation (3) can substitute into (5) and become following equation (6).…”
Section: B Effective Sizementioning
confidence: 99%
See 1 more Smart Citation
“…THE BYKA SCHEME Our scheme for authentication between the reader and card uses the BYka scheme [14] which enables these two devices who have not previously communicated with each other, to compute a shared secret pairwise key after obtaining each other's IDs. This is only possible if each device has a private key-set derived from its own ID and the master key kept by the company.…”
Section: Attacker Capabilitiesmentioning
confidence: 99%
“…Our proposal uses the newly developed Blom-Yang key agreement scheme (BYka) [14] as the authentication mechanism between the reader and card.…”
Section: Byka Authentication For Rfidmentioning
confidence: 99%